[vc_row][vc_column][fancy_heading h1=”0″ style=”line” title=”Virtual Private Network (VPN): Getting Started”][/fancy_heading][/vc_column][/vc_row][vc_row][vc_column][vc_tta_tour style=”modern” shape=”round” color=”sky” spacing=”30″ controls_size=”md” active_section=”1″][vc_tta_section title=”Goals ” tab_id=”1604049547682-d49bdc81-8e40″][vc_column_text]

  • Evaluate, implement and manage secure remote access techniques
  • Allow remote users and multiple sites to communicate securely

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Public ” tab_id=”1604049547713-8de3bd29-2f14″][vc_column_text]Network or system administrators, technicians, security specialists, consultants, system integrators.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Prerequisites ” tab_id=”1604049577493-1174f13f-6794″][vc_column_text]Basic knowledge of networks and security[/vc_column_text][/vc_tta_section][vc_tta_section title=”Duration ” tab_id=”1604049578544-c2463bd8-31be”][vc_column_text]3 Days.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Pedagogical Methods” tab_id=”1604049579366-3f6db7f1-3b84″][vc_column_text]This network training is punctuated by an alternation of presentations and practical work. For “Distance” training, they are carried out with a Teams or Zoom type videoconferencing tool depending on the case, allowing the trainer to adapt his pedagogy. our website full details on distance sessions or virtual classes.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Programs ” tab_id=”1604049580257-517f20b6-d85b”][vc_column_text]Technologies

Motivations for secure remote access VPN technologies: general VPN:. physical view. Virtual view Identifying network security issues

Management of confidential information: notions of cryptography

Objective of encryption Comparison of encryption techniques Public key infrastructure Other functions related to encryption hash, digital signature, certificates

Specification of security protocols

Protocol tunneling and encapsulationPresentation of PPTP protocol Presentation of L2TP protocol Presentation of IPSec protocol

User authentication

Authentication methods Authentication on PPPE Assessment of security systems and servers

Deploying a VPN

Configuring Incoming Dial-Up Connections Configuring VPN Ports Configuring User Incoming Call Settings
Creating a dial-up connectionConnecting to a virtual private networkInstalling and configuring a RADIUS serverConfiguring routingConfiguring on-demand connectionsExternalizing your VPNSelecting a service provider[/vc_column_text][/vc_tta_section][vc_tta_section title=”Register for training” tab_id=”1604049581510-1dad7900-25fc”][vc_column_text]

    [/vc_column_text][/vc_tta_section][/vc_tta_tour][/vc_column][/vc_row]